

Stop the war!
Остановите войну!
for scientists:


default search action
11. HAISA 2017: Adelaide, Australia
- Steven Furnell, Nathan L. Clarke:

Eleventh International Symposium on Human Aspects of Information Security & Assurance, HAISA 2017, Adelaide, Australia, November 28-30, 2017, Proceedings. University of Plymouth 2017, ISBN 978-1-84102-428-8
- Jurjen Jansen, Paul van Schaik:

Persuading End Users to Act Cautiously Online: Initial Findings of a Fear Appeals Study on Phishing. 1-11
- Marcus A. Butavicius, Kathryn Parsons, Malcolm R. Pattinson, Agata McCormac, Dragana Calic, Meredith Lillie:

Understanding susceptibility to phishing emails: Assessing the impact of individual differences and culture. 12-23
- Johan van de Merwe, Francois Mouton:

Mapping the Anatomy of Social Engineering Attacks to the Systems Engineering Life Cycle. 24-40
- Gaurav Misra, Nalin Asanka Gamagedara Arachchilage, Shlomo Berkovsky:

Phish Phinder: A Game Design Approach to Enhance User Confidence in Mitigating Phishing Attacks. 41-51
- Alaa Tolah, Steven Furnell, Maria Papadaki:

A comperhansive framework for cultivating and assessing Information Security Culture . 52-64
- Adéle da Veiga:

The influence of data protection regulation on the information security culture of an organisation - A case study comparing legislation and offices across jurisdictions. 65-79
- Agata McCormac, Dragana Calic, Marcus A. Butavicius, Kathryn Parsons, Malcolm R. Pattinson, Meredith Lillie:

Understanding the Relationships between Resilience, Work Stress and Information Security Awareness. 80-90
- Dirk Snyman, Hennie A. Kruger, Wayne D. Kearney:

The Lemming Effect in Information Security. 91-103
- Abdulhadi Shoufan, Ernesto Damiani:

How Reliable are Experts’ Assessments? A Case Study on UAV Security. 104-113
- Val A. Hooper, Jacques Ophoff:

The Influence of Organizational Commitment on Information Security Policy Compliance. 114-125
- Manal Alohali, Nathan L. Clarke, Fudong Li, Steven Furnell:

Identifying the Factors Affecting End-Users’ Risk-Taking Behavior. 126-144
- Andrew Reeves, Kathryn Parsons, Dragana Calic:

Securing mobile devices: Evaluating the relationship between risk perception, organisational commitment and information security awareness. 145-155
- Suné von Solms:

Digital Wellness: Concepts of cybersecurity presented visually for children. 156-166
- Joseph Omidosu, Jacques Ophoff:

Employee Information Security Beliefs in the Home Environment. 167-176
- Nicholas Micallef, Nalin Asanka Gamagedara Arachchilage:

Involving Users in the Design of a Serious Game for Security Questions Education. 177-187
- Adéle da Veiga:

An Information Privacy Culture Index Framework and Instrument to Measure Privacy Perceptions across Nations: Results of an Empirical Study. 188-201
- Ali Mohammad Padyab, Anna Ståhlbröst:

Privacy Enhancing Tools: A Literature Review on End-User Role and Evaluation. 202-214
- Henry Oladimeji, Jacques Ophoff:

Factors Influencing the Use of Privacy Settings in Location-Based Social Networks. 215-224
- Michael James, Patryk Szewczyk:

Jurisdictional Issues in Cloud Forensics. 225-235
- Chris Culnane, Vanessa Teague:

Why Open Government is good for cybersecurity and public trust - now would be a good time to start. 236-250
- Debi Ashenden:

What Do They Really Think? Overcoming Social Acceptability Bias in Information Security Research. 251-260
- Suné von Solms, Lynn Futcher:

Towards the Design of a Cybersecurity Module for Postgraduate Engineering Studies. 261-271
- Patryk Szewczyk, Dan Blackman, Krishnun Sansurooah:

An Analysis of Unauthorized Wireless Network Usage in Western Australia. 272-281
- Vuyolwethu Sizoli Mdunyelwa, Johannes Frederick Van Niekerk, Lynn Ann Futcher:

Secure Coding Practices in the Software Development Capstone Projects. 282-291
- Asanka I Pathirana, Patricia A. H. Williams:

The Socio-Technical Impact on Security of the Healthcare Internet of Things in the Use of Personal Monitoring Devices (PMDs). 292-302

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.

Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID















